Meghan Mumpower, Lucas McDuff, and Zach Biggers

Slides:



Advertisements
Similar presentations
pan Testing Centers I-9 Training
Advertisements

Airport Procedures 101. #1 Arrive to the airport Many people take a taxi or get a friend to drop them off to avoid having to pay to park at the airport.
 Passengers › The main idea is to make sure that the person who buys the boarding pass is the same person that, goes through security and boards the.
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
The Evolution of the Trusted Traveler Concept September 2010.
AVIATION SAFETY & SECURITY LECTURE 4: AIRPORT SECURITY
Colored Pencil Portrait --on black paper-- “thinking backwards”
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
THE FINGERPRINT  The reader acquires the fingerprint image.
“OUR MISSION IS TO STRENGTHEN OUR WORLD’S SECURITY WITH BIOMETRIC TECHNOLOGY”
The Role of Computers in Surveillance ~ Katie Hatland.
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
Facial Recognition Facial recognition software - based on the ability to recognize a face and then measure the various features of the face. Each human.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Sarchrmalsha Sarah Wilson, Christine Martin, Mallory Lehr, and Shania Wright A.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Examples of TPS 1 In this section, we examine the: components of a TPS the examples of real-time transaction processing batch transaction processing.
Lecture 5: AIRPORT SECURITY
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Partners National Sheriffs’ Association Bureau of Justice Assistance, Office of Justice Programs, U.S. Department of Justice.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
Workshop OAS/ICAO Bogota, Colombia November 10-12, 2008 Passport Canada Standards and Best Practices Debbie Richer District Manager, Edmonton.
South African Travel Products and Operations. Learning Unit 1: The Booking File Session to complete module: 1-3 Current session: 2-3 Date: 26/02/2013.
By: Ash, Jess, Natasha, Eslie.  Prevent customers from using fraud identity (false tickets) when being admitted into the theme park.
Types of Processing of Data www. ICT-Teacher.com.
PRESENTATION ON BIOMETRICS
Facial Recognition Systems By Derek Ciocca. 1.Parts of the system 2.Improving Accuracy 3.Current and future uses.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
Aladdin Security We supply what others can only assure.
Individual Activity: After reading the article, “Facial Recognition Technology” answer the questions on the assigned worksheet.
Safety Awareness Minute Airport Safety Tips
By: Suvigya Tripathi (09BEC094) Ankit V. Gupta (09BEC106) Guided By: Prof. Bhupendra Fataniya Dept. of Electronics and Communication Engineering, Nirma.
FACE RECOGNITION. A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a.
Identifications By: Tyler Hansberry. One of the biggest problems police may face with an investigation is the need to confirm or recognize an unknown.
WELCOME.
Dulles Airport Operations
3.6 Fundamentals of cyber security
Part1: Vocabulary preparation
English for Esfahan Airport Personnel
A Seminar Report On Face Recognition Technology
Personal Security Chapter :7
“Senator Al Franken raises concerns over iPhone X's Face ID”
Stovall and Klee Security
Basic Troubleshooting Techniques
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Air France Reservations Phone Number
Outlined Plan We will have initial retinal and fingerprint scans at check-ins for passengers that go with the person’s identity. There will be retinal.
The Best Car Service from Atlanta Airport Will Monitor All Incoming Flights In most situations, this may not seem all that important, but when you’re waiting.
A presentation of the floatplane safety video (TP 15067)
Meghan Mumpower, Lucas McDuff, and Zach Biggers
Ian Ramsey C of E School GCSE ICT On the move Final steps.
Red Flags Rule An Introduction County College of Morris
BSC Biometric Security System
BSC Biometric Security System
Biometric technology.
Digi Yatra.
BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY
By: Julia Elder, Anna Eades, Marques Angel
Meghan Mumpower, Lucas McDuff, and Zach Biggers
Phenotypes.
Unit 1 Tips.
By Cassidy Watson, Madison Pierce, Sidney Littleton and Ashley Poore
Digi Yatra.
Presentation transcript:

Meghan Mumpower, Lucas McDuff, and Zach Biggers #TooFly Meghan Mumpower, Lucas McDuff, and Zach Biggers

What Can We Do for You? We are a company that will is attempting to make flying safer for any passenger traveling with your airline. It will not only monitor people going onto your planes, but it also monitors people garnering tickets. This can oftentimes increase the city safety as well by limiting criminal travel and activity. We will be using different methods of biometrics such as photo identification and other photographic methods to identify passengers going through security.

The Plan How would this be done? What does it look for? We would like to have your customers take a picture while taking their ticket. There would be no specific background and only one person in the picture. There picture would be scanned into the system and stored until their flight. Upon arrival at your airport, in security, a facial scan would be done of the person and there would need to be seven different facial similarities between the photo and yourself. Then again, when boarding the plane, the same security procedure would be done. In addition, the person running the computer would also have to confirm the identification. When the computer is comparing your face with its recorded picture, it will look for various facial similarities. These could include: eye color, eye shape, cheek bone prominence, hair color, nose shape, forehead width, lip shape and color, skin tone, ridges, moles, and even prominent freckles. In order for the person to be cleared by the computer, seven facial traits have to be found in common with your picture and the scan.

What could go wrong? Although computers are usually accurate, we understand that they could malfunction. What would happen if the system shut down, in this case, there would be a back up computer. Along with this, the picture submitted would be printed on the individuals ticket and a person could verify that it is them. Another problem, what if the computer did not recognize them? Due to this, there would be a system. A trained official would be able to put in an override code. The only people that would have access to this code, would be the president of the airport, a trained official, and the CEO of the company. To ensure maximum security, the code will change every two days to reduce the threat of security breaches. Because of this, “beating the system” would be very difficult and near impossible.

IT WORKED! At the Atlanta International Airport, they wanted to make sure that people leaving their airport would be safer. They had a functioning security system, but not one that showed the people boarding this plane. Not only did this begin to help airport safety and organization, but it had another positive affect. Many criminals were still traveling through the airports right under the police’s nose. With this installment, the criminal had to be identified by using his name and the picture now matched the federal database. This not only increased the airport security, but the city safety.